riskren
Web Penetration Path
Web Penetration Path
The Web Penetration Tester Job Role Path is for individuals who want to enter the world of web penetration testing with little to no prior experience in it. This path covers core web security assessment and web penetration testing concepts, and provides a deep understanding of the attack tactics used during web penetration testing. Armed with the necessary theoretical background, multiple practical exercises, and a proven web penetration testing methodology, students will go through all web penetration testing stages, from reconnaissance and vulnerability identification to exploitation, documentation, and communication to vendors. Upon completing this job role path, you will have become proficient in the most common web penetration testing and attack techniques against web applications and APIs, and be in the position of professionally reporting vulnerabilities to a vendor.
HTB Academy
Completed Attacking Common Applications
Completed Attacking Common Applications
Penetration Testers can come across various applications, such as Content Management Systems, custom web applications, internal portals used by developers and sysadmins, and more. It's common to find the same applications across many different environments. While an application may not be vulnerable in one environment, it may be misconfigured or unpatched in the next. It is important as an assessor to have a firm grasp of enumerating and attacking the common applications discussed in this module. This knowledge will help when encountering other types of applications during assessments.
Completed API Attacks
Completed API Attacks
Web APIs serve as crucial connectors across diverse entities in the modern digital landscape. However, their extensive functionality also exposes them to a range of potential attacks. This module introduces API Attacks, with a specific focus on the OWASP API Security Top 10 - 2023.
Completed File Inclusion
Completed File Inclusion
File Inclusion is a common web application vulnerability, which can be easily overlooked as part of a web application's functionality.
Completed Attacking GraphQL
Completed Attacking GraphQL
Completed Bug Bounty Hunting Process
Completed Bug Bounty Hunting Process
Completed Web Fuzzing
Completed Web Fuzzing
Completed Hacking WordPress
Completed Hacking WordPress
Completed Server-Side Attacks
Completed Server-Side Attacks
Completed Web Attacks
Completed Web Attacks
Completed Command Injections
Completed Command Injections
Completed Broken Authentication
Completed Broken Authentication
Completed SQLMap Essentials
Completed SQLMap Essentials
The SQLMap Essentials module will teach you the basics of using SQLMap to discover various types of SQL Injection vulnerabilities, all the way to the advanced enumeration of databases to retrieve all data of interest.
Completed File Upload Attacks
Completed File Upload Attacks
Completed Introduction to Web Applications
Completed Introduction to Web Applications
Completed Cracking into Hack the Box
Completed Cracking into Hack the Box
Completed Cross-Site Scripting (XSS)
Completed Cross-Site Scripting (XSS)
Completed SQL Injection Fundamentals
Completed SQL Injection Fundamentals
Completed Login Brute Forcing
Completed Login Brute Forcing
Completed Attacking Web Applications with Ffuf
Completed Attacking Web Applications with Ffuf
Completed Password Attacks
Completed Password Attacks
Completed Using Web Proxies
Completed Using Web Proxies
Completed Network Enumeration with Nmap
Completed Network Enumeration with Nmap
Completed Information Gathering - Web Edition
Completed Information Gathering - Web Edition
Completed Footprinting
Completed Footprinting
Completed Vulnerability Assessment
Completed Vulnerability Assessment
Completed File Transfers
Completed File Transfers
Completed Shells & Payloads
Completed Shells & Payloads
Completed Using the Metasploit Framework
Completed Using the Metasploit Framework
Completed Web Requests
Completed Web Requests
View on mobile
Explore other Linktrees
arianagrande
@arianagrande
morepurposepod
@morepurposepod
Heather Traska
@heathertraska
Ashe
@ashemusic
Ken Eurich
@keneurich
TMG Studios
@tmgstudios
zoltancomedy
@zoltancomedy
Sofia Tilbury
@sofiatilbury
Julian Sewell
@juliansewell
Alli Weatherly
@alliweatherly
previous
next
Discover more
See all
@Jirah18
@malinhadivertidaoficial
@jheniferbarbosaoficial
@reitersfinestfamily
@afrofusiondaily
@vernacular.mag
@mollelterrel
@automateagencies.io
@totoro7897
@zarichenpedro
@shahana.artstudio
@KINKAOTHAI
@embroiderygp
@ResourcesWhileTheyLast
@superhotdog
@AyodejiWriter
@hey_._lah
@Roseelo
@wendim
@fueledbyfountane
@emarahmawati
@RebelLensFilms
@carfieldtang
@temperodainamar
@ericchurchmusic
@leanibarra
@propolis.gold
@sendorath
@cacarecosdacris
@kangyoujin
@prontoincometax
@raiaspa
@conceptbunker
@VelvetRoomyYYC
@NoelLuceno
@m1lkg0ddess
@fesya_grill
@fortheloveofdance
@homerunrealestate
@wrapsandchats
@bellastusse
@Sofianeinnal
@yushaa.photography
@stabbedbykayla
@youthled_algeria